Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

126results about How to "Prevent illegal tampering" patented technology

Novel offline payment method

The invention discloses a novel offline payment method. The method comprises the steps that account numbers of an accountee party and a receiving party serve as IDs, and a corresponding public key and private key are mapped according to business sub-domain identifications; a random number is selected from the receiving party, signature is conducted on the random number through the private key, and a two-dimension code is generated; the two-dimension code is scanned through the accountee party, the public key is mapped by means of the receiving party ID and the service sub-domain identification, and attestation is conducted on a signing message; if attestation succeeds, the accountee party successfully pays according to transaction information; signature is conducted on the random number by the accountee party through the private key after payment to generate a two-dimension code; the receiving party scans the two-dimension code, the public key is mapped through the accountee party ID and the business sub-domain identification, and attestation is conducted on a signing message; if attestation succeeds, posting is successfully conducted on the receiving party. According to the novel offline payment method, payment does not rely on the support of a network any more, payment is achieved on various mobile equipment, and the payment process is greatly facilitated. The two-way authentication process based on the identifications is adopted by the two payment parties, the legality of transactions is fully guaranteed, and illegal manipulation of information and information disguising are prevented.
Owner:CHINA SMARTCITY TECH

Multilink safety communication method based on completion port model

The invention provides a method for supporting multilink concurrence safety communication between a server and multiple clients and relates to a multilink safety communication method based on a completion port model. The method includes that a main worker thread at a communication server is embedded into an application service of a Windows system to run, a transmission control protocol (TCP) communication server is built according to the completion port model, meanwhile a fixed number of communication interface threads are built to conduct communication with the clients in an asynchronous mode, and the parallel processing capability of the server is improved. In an interaction process, after any client builds the TCP connection, two communication parties must adopt a handshake mechanism to ensure connection legality and adopt connection pool queues or local variables to dynamically maintain message serial numbers in the following data receiving and transmitting process, data transmitted by any party on the legal connection are packaged again according to the data package structure definition, and the receiving party adopts a safety verification algorithm to verify the data packages and regroup the plurality of data packages according to the precedence order of the message serial numbers.
Owner:中船凌久高科(武汉)有限公司

Blockchain-based medical electronic medical record distributed management system and construction method thereof

The invention discloses a blockchain-based medical electronic medical record distributed management system and a construction method thereof. According to the blockchain-based medical electronic medical record distributed management system and the construction method thereof, the diagnosis processes of patients, such as medical records and prescriptions, are written into a blockchain in the form of smart contracts, so that a relevant hospital does not need to rely on a centralized server to manage the medical record information of the patients, and single-point failures common to the centralized server can be avoided; the data stored in the blockchain cannot be tempered and are traceable, and therefore, illegal tampering can be prevented; and a series of information such as the physical health, medical histories, and personal data of the patients, which concern personal privacy, can be effectively protected through an ABE encryption algorithm. With the system and method of the invention adopted, data loss caused by the single-point failures can be avoided, system maintenance cost can be decreased, and a condition that the diagnosis records of the patients are falsified during medical disputes can be avoided.
Owner:JINAN UNIVERSITY

Method for establishing a secure communication link in a multi-UAV environment

The present invention discloses a method for establishing a secure communication link in a multi-UAV environment and mainly solves the problems that the link state is unstable and data is easily captured, deleted and even tampered by a third party due to frequent changes for a network topology in the existing Unmanned Aerial Vehicle (UAV) communication technology. The technical scheme of the present invention is as follows: satellites and Airborne Early Warning Aircrafts (AEW) are efficiently utilized to manage UAV nodes in terms of data transmission requirements for the UAV; a reliable link look-up and establishing method for the UAV communication is designed; a reliable interaction protocol is used when establishing the communication link so as to avoid the false communication requests and responses and prevent the link information from being tampered by malicious nodes; and data is encrypted with a private key allocated by a ground station so as to ensure the safety of messages and improve the stability and security for the UAV communication; meanwhile, the survivability of the system is enhanced by providing effective solutions for the condition of damaged link. The method provided by the invention can be used for establishing a secure communication link in a multi-UAV environment.
Owner:XIDIAN UNIV +1

Cloud data security protection method adopting fully homomorphic encryption technology and multiple digital watermarking technology

The present invention discloses a cloud data security protection method adopting a fully homomorphic encryption technology and a multiple digital watermarking technology. The cloud data security protection method is characterized in that in a cloud computing environment, a trusted third-party organization distributes a key to a user, after the user stores the key, a fully homomorphic encryption scheme is adopted to encrypt to-be-uploaded data at a user side, then the encrypted data is uploaded to a cloud side, thereby ensuring transmission security and storage security of data; in addition, when the user searches for data, direct search for ciphertext can be performed after a search keyword is encrypted, thereby improving search efficiency; and moreover, before the data is uploaded to the cloud side, a fragile watermarking and a robust watermarking are respectively embedded into the to-be-uploaded data, the purpose of embedding of the fragile watermarking is to prevent illegal modification of the data, so as to achieve authentication for integrity of the data, and the purpose of embedding of the robust watermarking is to protect copyright of the data, so as to achieve authentication for copyright of the data.
Owner:JIANGSU BOZHI SOFTWARE TECH CO LTD

A Trusted Software Base for Proactive Security Services

InactiveCN102270287APrevent unauthorized operationsPrevent unauthorized modificationPlatform integrity maintainanceActive safetyBIOS
The invention discloses a trusted software base providing an active security service, comprising a trusted password module and an operating system kernel. The operating system kernel is provided with a kernel-level trusted password module driver, a kernel-level trusted software stack and a kernel-level security service module; a security manager and a security strategy server are arranged in the kernel-level security service module; the trusted password module provides a hardware engine for encryption operation and hash operation, and verifies integrity of a trusted BIOS (Basic Input/Output System); the trusted BIOS is used for verifies the integrity of PC hardware devices and an MBR (Master Boot Record); the MBR is used for guiding an OS (Operating system) Loader, and verifies the integrity of the OS Loader; and the kernel-level security service module captures security related information at a key security control point in a kernel layer of the operating system, and performs access control and least privilege control. The trusted software base effectively prevents unauthorized operations and rogue programs from performing unauthorized modification on application codes and configurations, and prevents secret disclosure of application resources, thereby guaranteeing the privacy and the integrity of an application environment.
Owner:中国人民解放军海军计算技术研究所

Intelligent contract bookkeeping method, computer device and readable storage medium

The invention is applicable to the field of computer technology, and provides an intelligent contract bookkeeping method, a computer device and a readable storage medium. The method comprises the following steps: a user bookkeeping node constructs an intelligent contract calling transaction, and broadcasts the transaction throughout the network after signing; The bookkeeping node verifies the contract call transaction after receiving the contract call transaction, and stores the contract call transaction into the contract queue after the verification is passed; At the same time, the contract management server transfers out the contract corresponding to the transaction from the contract queue and executes the contract, generates the contract execution result, and creates the contract returnresult transaction according to the contract execution result and broadcasts after signing; The bookkeeping node performs transaction signature verification after receiving the contract return resulttransaction, stores the contract return result transaction into the queue to be packed after verification, updates the intelligent contract information of the block and broadcasts the block, triggersthe bookkeeping operation. The bookkeeping operation safety of the invention is good, and the intelligent contract can be more focused on the service of the service data, thereby improving the service efficiency.
Owner:WEALEDGER NETWORK TECH CO LTD

Secure communication system and method of main control chip and encryption chip

The invention discloses a secure communication system of a main control chip and an encryption chip. The system comprises the main control chip and the encryption chip, wherein the main control chip is connected with the encryption chip; the main control chip and the encryption chip perform authentication via challenge response; the main control chip comprises a random number generation module, afirst encryption and decryption operation module and a first secure storage module; and the encryption chip comprises a counter module, a second encryption and decryption operation module and a secondsecure storage module. The invention also discloses a secure communication method of the main control chip and the encryption chip. The invention relates to the technical field of secure communication, and in particular relates to the secure communication system and method of the main control chip and the encryption chip. The main control chip and the encryption chip perform authentication via challenge response, the chip is effectively prevented from being illegally tampered, a random number is used as a key, communication data between the main control chip and the encryption chip is subjected to encryption treatment and decryption treatment by using the encryption and decryption operation modules, the data transmission security is effectively ensured, and the data exchange security is ensured.
Owner:深圳市中易通安全芯科技有限公司

Digital asset right confirmation transaction method based on block chain technology

ActiveCN108764877AGuarantee safe and reliableRealize remote point-to-point secure interactionPayment protocolsPaymentDigital fingerprint
The invention discloses a digital asset right confirmation transaction method based on a block chain technology. The method comprises the following steps of carrying out unique identification identitycoding on each stage property and character role; carrying out real-name system registration through utilization of an account registration management module; sending out a transaction request through utilization of a transaction payment module, and generating a pair of public key and private key through adoption of an asymmetric algorithm; encrypting identity codes, digital funds, the stage properties and the character roles through utilization of a pubic key and feeding back a private key to a buyer and a seller; encrypting the identity codes, the digital funds, the stage properties and the character roles through utilization of a Hash algorithm after the identity codes, the digital funds, the stage properties and the character roles are encrypted through utilization of the pubic key,and generating a digital fingerprint; and storing the digital fingerprint to Mysql databases, forming a transaction block chain, and storing information to the Mysql database of each transaction nodein a distributed mode. The method has the advantages that the method is secure and reliable, is convenient for query and is reliable in data storage, and illegal tampering is avoided. The method has very high practical value and popularization value in the technical field of digital asset right confirmation transaction.
Owner:密钥科技(深圳)有限公司

Verification method of electronic seal pattern and verification method of file containing electronic seal

The invention discloses a verification method of an electronic seal pattern and a verification method of a file containing an electronic seal. A time parameter of the moment when the seal signs is converted into data and taken as a variable, the data and pixel data of the seal pattern of seal hardware perform combination operation, and data obtained after the combination operation are subjected to operation of a hash function, so that a hardware seal verification code is obtained; the hardware seal verification code and the time parameter of the moment when the seal signs are stored, encrypted and transmitted to a verification network by a computer; the verification network receives and decodes the hardware seal verification code and the time parameter of the moment when the seal signs, the time parameter of the moment when the seal signs is converted into data and taken as a variable, the data and pixel data of the seal pattern of the verification network are subjected to combination operation, and data obtained after the combination operation are subjected to operation of the hash function, so that a network seal verification code is obtained; and consistency of the hardware seal verification code and the network seal verification code is compared, so that the primitiveness of the seal pattern is verified, and seal verification information is generated.
Owner:西安华力国盾信息技术有限公司

Flash memory data management method and device and computer readable storage medium

The invention discloses a flash memory data management method and device and a computer readable storage medium, and relates to the technical field of data storage management. The flash memory data management method and device and the computer readable storage medium aims at solving the technical problem of an existing wireless communication device that the module stability and reliability are influenced since flash memory data is abnormal. The flash memory data management method comprises the following steps of setting a root file system of a wireless communication module as a read-only file system and mounting a laminated file system to a memory; setting the root file system as the laminated file system and mounting a configuration catalogue of the root file system into a readable and writable file system partition of a flash memory in the wireless communication module. According to the flash memory data management method and device and the computer readable storage medium, the laminated file system and a recovery mechanism of the file system are adopted to improve the stability and reliability of the wireless communication module, and after-sales maintenance work of a product of the type of the wireless communication module is also reduced.
Owner:高新兴物联科技股份有限公司

PE loader-based software packing protection method

The invention relates to a PE loader-based software packing protection method. The method comprises the following steps of: mapping a shell template into an internal memory, repositioning the base address of the shell template by simulating a PE loader of Windows and calculating a relative virtual address (RVA) of a segment where the entry point of the shell template is positioned and the size of the segment, wherein the calculated RVA value of the segment and the size value of the segment are taken as parameters and a hash value calculated by a secure hash algorithm (SHA) is taken as a key of an advanced encryption standard (AES) encryption algorithm; mapping protected software into the internal memory and encrypting the protected software by the AES encryption algorithm by using calculated key; adding encrypted data into a Reloc segment of the shell template; processing a special resource in the software to be protected and extracting additional data of the special resource, attaching the special resource and the additional data to the end of a shell template file respectively and modifying a corresponding data item related to the special resource in the PE structure of the shell template; and repeating the modified shell template from the internal memory to a disc so as to obtain protected software. The method remarkably enhances the safety of the software.
Owner:XIAN UNIV OF TECH

6LoWPAN-based intelligent fire-fighting service system for colleges and universities and design method

The invention discloses a 6LoWPAN-based intelligent fire-fighting service system for colleges and universities and a design method of the 6LoWPAN-based intelligent fire-fighting service system. The service system comprises a data acquisition layer, a data transmission layer, a data control layer and a system application layer, good interoperability of the 6LoWPAN can solve information isolation, the 6LoWPAN supports the intercommunication with other IEEE (Institute of Electrical and Electronic Engineers) 802.15. 4 equipment and supports the interconnection with other IP networks; through designing a data control layer based on fire-fighting big data, intelligentized analysis of data, intelligent control on fire-fighting equipment, a visual service platform is established; through analyzingand mining fire-fighting big data, the fire situation is predicted and a solution is formulated, the fire prevention and control efficiency is improved, the intelligence of a service platform is realized, the purposes of equipment management centralization, fire-fighting construction underlying data management intellectualization and management system platformization are achieved, and the systemhas the characteristics of high feasibility, convenience in networking and easiness in maintenance and upgrading.
Owner:CENT SOUTH UNIV +1

Reputation evaluation method and system for privacy protection based on block chain

The invention relates to a reputation evaluation method and system for privacy protection based on a block chain, and belongs to the technical field of blind signatures, secure multi-party signaturesand block chains. After the user and the merchant finish the online transaction, anonymous evaluation is carried out on the merchant to generate an evaluation transaction, the evaluation transaction is sent to the alliance block chain network, each service provider carries out partial decryption on the evaluation in the evaluation transaction and sends the evaluation to the block chain network, and the merchant updates the reputation of the merchant according to the partial decryption information. Specifically, the method comprises the following steps: a user, a merchant and a service providerregister with a trusted party to obtain corresponding keys; and the user accesses the reputation of the merchant under each service provider, evaluates the service provider after online transaction,broadcasts the reputation in a block chain transaction form, and the service provider serves as a miner of the block chain network, calculates the obtained evaluation for all merchants and updates themerchants. The method and the system have the advantages of reputation publicity, reputation availability, data audit and effective privacy protection for user evaluation.
Owner:BEIJING INSTITUTE OF TECHNOLOGYGY

Security management system and method of dependable computing platform

The invention discloses a security management system and method of a dependable computing platform. The security management system comprises a dependable code module, a security management center module, a security management agent module and a security strategy management protocol module; the security strategy management protocol module between the security management center module and the dependable code module is realized on basis of the dependable code module so that the security of the transmission of a security management strategy is ensured; the security protection of a security strategy at a security management center is realized on basis of the dependable code module; and a security strategy at the dependable computing platform is stored in the dependable code module, and the security of the security strategy is protected by the dependable code module so that the security of the storage of the security management strategy is ensured. The security management method based on the dependable computing platform comprises a step of generating a security strategy management protocol and steps of producing, extracting and deleting a new security strategy by the security management center and has the advantages of fulfilling the protection of encryption and integrity verification of security strategy data and preventing data leakage and unauthorized tampering of the security strategy data from an attacker.
Owner:中国人民解放军海军计算技术研究所

Terminal startup method, terminal, and signature device

The invention discloses a terminal startup method, a terminal and a signature device. The method comprises the following steps: when a verification certificate is detected in a terminal, the terminalunsigns the verification certificate by using a preset public key to obtain an identification and a status value carried by the verification certificate; when the verification certificate is detected,the terminal unsigns the verification certificate by using a preset public key to obtain a status value carried by the verification certificate. Wherein the verification certificate is written into the terminal after the signing device signs through the preset private key; the terminal obtains a chip identification of a main chip and a current state value of the terminal; the terminal judges whether the chip identifier is the same as the identifier carried by the verification certificate and whether the current state value is the same as the state value carried by the verification certificate. If all are the same, the terminal starts normally. By adopting the application, the program start control of the terminal can be carried out by introducing a verification certificate, the anti-theftreliability is improved, a special circuit is not required to be introduced, and the cost is low.
Owner:HUAWEI TECH CO LTD

Lightweight mirror image file encryption system and method

The invention discloses a lightweight mirror image file encryption system and a lightweight mirror image file encryption method and belongs to the technical field of cloud computing of computers. A mirror image file in a cloud computing system is encrypted, stored and managed. The encryption system comprises a key management module, a mirror image file block management module, an encryption / decryption module, a pseudo partitioning management module, a database and a background storage system. The encryption method comprises a key acquisition stage, a mirror image file partitioning stage, a mirror image file storage stage, a mirror image file reading stage and a pseudo partitioning maintenance stage. The mirror image file block management module is used for equally segmenting all mirror image files and then protecting the mirror image files through an encryption block mapping table. The safety of the mirror image files is ensured, and the encryption / decryption time cost is lower. Meanwhile, by creating and managing pseudo blocks in an idle storage space, the possibility of brute force is further reduced, and the safety is improved. The lightweight mirror image file encryption system and the lightweight mirror image file encryption method are applicable to any cloud computing system relating to mirror image file management.
Owner:THE 28TH RES INST OF CHINA ELECTRONICS TECH GROUP CORP

Digital asset transaction method and device based on block chain, and storage medium

The invention provides a digital asset transaction method and device based on a block chain, and a storage medium. The method comprises the following steps: receiving a digital asset transaction request of a transaction initiator, wherein the digital asset transaction request comprises the information of the transaction initiator and a digital asset identifier; determining a transaction receiver according to the digital asset transaction request; when the information of the transaction initiator and the transaction receiver meets the verification condition, generating a digital watermark according to the digital asset transaction request, and generating a digital watermark according to the information of the transaction initiator, the information of the transaction receiver and the digitalasset information; obtaining digital assets embedded with digital watermark according to the digital watermark and the digital asset corresponding to the digital asset transaction request; and sending the digital asset embedded with the digital watermark to the transaction initiator according to the intelligent contract corresponding to the digital asset transaction request. An infringement userwho leaks the digital asset can be accurately positioned, and the digital asset right protection cost is reduced.
Owner:GLOBAL ENERGY INTERCONNECTION RES INST CO LTD +2

Method for preventing tampering of identity information in real name authentication

The invention provides a method for preventing tampering of identity information in real name authentication, and belongs to the field of methods for preventing tampering of identity information. A service system is provided. The service system is connected with radio-frequency equipment, and used for reading encrypted identity information in an identity card through the radio-frequency equipment, and decoding the encrypted identity information through decoding equipment at the other end of a network. Decoded identity information is returned to the service system. The method comprises the following steps that: the service system controls the radio-frequency equipment to acquire the encrypted identity information through an interface library, and transmits the encrypted identity information to the decoding equipment through a TCP / IP (Transmission Control Protocol / Internet Protocol) network; the decoding equipment decodes the received identity information, calculates a feature code with content in the identity information, and transmits the feature codes to the service system; and the service system verifies whether the identity information is tampered or not with the feature code. Through adoption of the method, the identity information can be effectively prevented from being tampered.
Owner:SHANDONG SENTER ELECTRONICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products